[ubuntu/oracular-security] xwayland 2:24.1.2-1ubuntu0.6 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Tue Jun 17 14:56:07 UTC 2025
xwayland (2:24.1.2-1ubuntu0.6) oracular-security; urgency=medium
* SECURITY UPDATE: Out-of-bounds access in X Rendering extension
- debian/patches/CVE-2025-49175.patch: avoid 0 or less animated cursors
in render/animcur.c, render/render.c.
- CVE-2025-49175
* SECURITY UPDATE: Integer overflow in Big Requests Extension
- debian/patches/CVE-2025-49176.patch: do not overflow the integer size
with BigRequest in dix/dispatch.c, os/io.c.
- CVE-2025-49176
* SECURITY UPDATE: Data leak in XFIXES Extension 6
- debian/patches/CVE-2025-49177.patch: check request length for
SetClientDisconnectMode in xfixes/disconnect.c.
- CVE-2025-49177
* SECURITY UPDATE: Unprocessed client request via bytes to ignore
- debian/patches/CVE-2025-49178.patch: account for bytes to ignore when
sharing input buffer in os/io.c.
- CVE-2025-49178
* SECURITY UPDATE: Integer overflow in X Record extension
- debian/patches/CVE-2025-49179.patch: check for overflow in
RecordSanityCheckRegisterClients() in record/record.c.
- CVE-2025-49179
* SECURITY UPDATE: Integer overflow in RandR extension
- debian/patches/CVE-2025-49180-1.patch: check for overflow in
RRChangeProviderProperty() in randr/rrproviderproperty.c.
- CVE-2025-49180
xwayland (2:24.1.2-1ubuntu0.5) oracular; urgency=medium
* Backport patches to avoid crash after the busy-loop fix (LP: 2043517).
With the busy-loop fixed, XWayland can now proceed further and may
encounter a new crash (LP: #2096653).
- xwayland-glamor-cleanup-xwl_gbm-only-once.patch
- xwayland-glamor-disable-after-gbm-cleanup.patch
Date: 2025-06-11 13:21:19.506100+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/xwayland/2:24.1.2-1ubuntu0.6
-------------- next part --------------
Sorry, changesfile not available.
More information about the oracular-changes
mailing list